Abstract
This chapter is meant to be an appetizer and lightly relies on the reader’s intuition to understand the mathematical steps involved. The chapter directly introduces two quantum algorithms: (1) How to encrypt messages (cryptography), which if snooped upon during transmission to a recipient, will be detected; and (2) how to teleport the state of a quantum object. Along the way just enough intuitively understandable but weird and exclusive aspects of quantum mechanics as compared to classical mechanics are introduced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Feynman [15], Chap. 6.
- 2.
Feynman [15].
- 3.
Turing [31].
- 4.
Wootters and Zurek [33].
- 5.
As quoted in: Mermin [20]. “Einstein maintained that quantum metaphysics entails spooky actions at a distance; experiments have now shown that what bothered Einstein is not a debatable point but the observed behaviour of the real world.”
- 6.
- 7.
All four postulates are formally described in Chap. 2, Sect. 2.7.
- 8.
Schumacher [26].
- 9.
- 10.
Developed by Gilbert S. Vernam of AT&T. This is the only known totally secure cypher. Vernam was granted a patent protecting the cypher: Secret Signaling System. US Patent No. 1,310, 719, patented July 22, 1919.
- 11.
- 12.
Rivest et al. [25]. See also: Allenby and Redfern [2]. Rivest, Shamir, and Adleman received the Turing award for 2002 for their contributions to public key cryptography . http://www.acm.org/announcements/turing_2002.html.
- 13.
Bennett and Brassard [7]. The first quantum cryptography ideas were proposed by Stephen Wiesner in the late 1960s, but unfortunately were not accepted for publication at the time! It was eventually published in 1983, Wiesner [32]. Bennett and Brassard built upon Wiesner’s work. A simple proof of the security of the BB84 protocol was provided by Shor and Preskill [28]. See also: Brassard and Crépeau [11] and Brassard [10].
- 14.
- 15.
Giles [17].
- 16.
Bennett et al. [8].
- 17.
- 18.
Polzik et al. [22].
- 19.
Bussieres et al. [12].
- 20.
Tsurumoto et al. [30].
- 21.
- 22.
Castelvecchi [13].
- 23.
For an easy to understand reference for eigenvalues and eigenvectors, see Chap. 6, http://math.mit.edu/~gs/linearalgebra/ila0601.pdf in Strang [29].
References
D. Alba, in China Unveils Secret Quantum Communications Experiment, IEEE Spectrum, 13 June 2013. http://spectrum.ieee.org/tech-talk/aerospace/satellites/china-unveils-secret-quantum-communications-experiment
R.B.J.T. Allenby, E.J Redfern, in Introduction to Number Theory with Computing (Edward Arnold, London, 1989), pp. 279–284
A. Aspect, J. Dalibard, G. Roger, Experimental test of bell’s inequalities using time-varying analyzers. Phys. Rev. Lett. 49(25), 1804–1807 (20 Dec 1982). http://www.drchinese.com/David/Aspect.pdf. This paper provided experimental evidence that over-ruled Einstein’s objections described in his EPR paper
A. Barenco, C.H. Bennett, R. Cleve, D.P. DiVincenzo, N. Margolus, P. Shor, T. Sleator, J.A. Smolin, H. Weinfurter, Elementary gates for quantum computation. Phys. Rev. A 52, 3457–3467 (1995). arXiv:quant-ph/9503016v1. 23 Mar 1995. https://arxiv.org/pdf/quant-ph/9503016.pdf
M.D. Barrett et al., Deterministic quantum teleportation of atomic qubits. Nature 429, 737–739 (2004)
J.S. Bell, On the Einstein Podolsky Rosen paradox. Physics 1, 195–200 (1964). http://www.drchinese.com/David/Bell.pdf. It contains Bell’s theorem related to entangled pairs. The mathematical proof is brilliant and relatively straightforward
C.H. Bennett, G. Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing, in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, IEEE, New York (The conference was held at Bangalore, India, Dec 1984), pp. 175–179
C.H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres, W. Wootters, Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993)
P.E. Black, D. Richard Kuhn, C.J. Williams, in Quantum Computing and Communications, Advances in Computers, vol. 56 (Academic Press, 2002)
G. Brassard, in Brief History of Quantum Cryptography: A Personal Perspective (2006). arXiv:quant-ph/0604072v1 11 Apr 2006. https://arxiv.org/pdf/quant-ph/0604072.pdf
G. Brassard, C. Crépeau, in Cryptology Column—25 Years of Quantum Cryptography (ACM SIGACT News · Sept 1996), pp. 1–12. https://www.researchgate.net/publication/220556114_25_years_of_quantum_cryptography
F. Bussieres et al., in Quantum Teleportation from A Telecom-Wavelength Photon To A Solid-State Quantum Memory (2014). arxiv.org/abs/1401.6958, 27 Jan 2014. http://arxiv.org/abs/1401.6958
D. Castelvecchi, China’s quantum satellite clears major hurdle on way to ultrasecure communications. Nature, 15 June 2017. https://www.nature.com/news/china-s-quantum-satellite-clears-major-hurdle-on-way-to-ultrasecure-communications-1.22142
A. Einstein, B. Podolsky, N. Rosen, Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 41, pp. 777–780 (1935). http://www.drchinese.com/David/EPR.pdf. Known as the EPR paper, it claimed that QM was an incomplete theory. After Einstein died in 1955, John Bell and others would prove him wrong
R. Feynman, in The Character of Physical Law, Modern Library Edition, 1994 (Originally published by BBC in 1965, and in paperback by MIT Press, 1967, 1965)
E. Gibney, Chinese satellite is one giant step for the quantum internet. Nature 27 July 2016 (updated 16 Aug 2016). http://www.nature.com/news/chinese-satellite-is-one-giant-step-for-the-quantum-internet-1.20329
M. Giles, The man turning china into a quantum superpower. MIT Technol. Rev. 19 Dec 2018 (1965). https://www.technologyreview.com/s/612596/the-man-turning-china-into-a-quantum-superpower/
O. Goldreich, Foundations of Cryptography, vol. 2 (Cambridge University Press, 2004). http://www.wisdom.weizmann.ac.il/~oded/foc-book.html
J.P. Lewis (2001) Large limits to software estimation. ACM Softw. Eng. Notes 26(4), 54–59
N.D. Mermin (1985) Is the moon there when nobody looks? Real. Quant. Theory, Phys. Today 38–47. http://maltoni.web.cern.ch/maltoni/PHY1222/mermin_moon.pdf
S. Muralidharan et al., in Efficient Long Distance Quantum Communication (2015). arXiv:1509.08435v1 [quant-ph], 28 Sept 2015, http://arxiv.org/pdf/1509.08435v1.pdf
E.S. Polzik et al., Quantum teleportation between light and matter. Nature 443, 557–560 (2006)
J. Qiu, Quantum communications leap out of the lab. Nature 508, 441–442 (2014). http://www.nature.com/polopoly_fs/1.15093!/menu/main/topColumns/topLeftColumn/pdf/508441a.pdf
M. Riebe et al., Deterministic quantum teleportation with atoms. Nature 429, 734–737 (2004)
R.L. Rivest, A. Shamir, L.M. Adleman, A method of obtaining digital signatures and public-key cryptosystems. Comm. ACM 21(2), 120–126 (1978)
B. Schumacher, Quantum coding. Phys. Rev. A 5(4), 2738–2747 (1995)
C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (Oct 1949) (The material in this paper appeared originally in a confidential report “A Mathematical Theory of Cryptography” dated Sept. 1, 1945, which has now been declassified.). http://pages.cs.wisc.edu/~rist/642-spring-2014/shannon-secrecy.pdf
P. W. Shor, J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000). arXiv quant-ph/0003004, 2000. http://arxiv.org/PS_cache/quant-ph/pdf/0003/0003004.pdf
G. Strang (2014) in Differential Equations and Linear Algebra (Wellesley-Cambridge Press, MA, 2014)
K. Tsurumoto, R. Kuroiwa, H. Kano, Y, Sekiguchi, H. Kosaka, Quantum teleportation-based state transfer of photon polarization into a carbon spin in diamond. Commun. Phys. 2(74) (2019). https://www.nature.com/articles/s42005-019-0158-0
A. Turing (1936) On computable numbers, with an application to the Entscheidungs problem, in Proceedings of the London Mathematical Society, Series 2, vol. 42, pp. 230–265; Errata (1937), vol. 43, pp. 544–546. http://www.abelard.org/turpap2/tp2-ie.asp
S. Wiesner, Conjugate coding. Sigact News 15(1), 78–88 (1983). (Original manuscript written circa 1969)
W.K. Wootters, W.H. Zurek, A single quantum cannot be cloned. Nature, 299, 802–803 (1982). http://puhep1.princeton.edu/~mcdonald/examples/QM/woottersnature29980282.pdf
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Bera, R.K. (2020). Quantum Cryptography and Quantum Teleportation. In: The Amazing World of Quantum Computing. Undergraduate Lecture Notes in Physics. Springer, Singapore. https://doi.org/10.1007/978-981-15-2471-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-2471-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2470-7
Online ISBN: 978-981-15-2471-4
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)